Dynamic security for multi-user access control in distributed environment

被引:0
|
作者
Prakash, S. Jaya [1 ]
Kumar, K. Varada Raj [1 ]
Nedunuri, Deepak [1 ]
机构
[1] Sir CR Reddy Coll Engn, Dept CSE, Eluru, India
关键词
Cloud Computing; IGSA; Secure Multi key Word Search; KEYWORD SEARCH; ENCRYPTION;
D O I
10.1088/1742-6596/1228/1/012016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is an on-demand facilities that allows customers to access processing sources and services from anywhere and at any time. Information protection means defending the information from illegal individuals or online hackers. We propose Integrated Group Sharing Approach (IGSA) schema for multiple customer accessibility control in customer operations like information insertion, deletion and in customer cancellation immediately reasoning database integration. We look at the security of IGSA plan and assess with the current IGSA techniques which are used for information access immediately reasoning computing for achieving real-time applications in reasoning. Our experimental results show efficient information removal from multiple customer accessibility in search of information from reasoning server. In future, some protection systems are to be developed to provide protection to cloud.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Deep Multi-User Reinforcement Learning for Distributed Dynamic Spectrum Access
    Naparstek, Oshri
    Cohen, Kobi
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (01) : 310 - 323
  • [2] A Distributed Stable Strategy Learning Algorithm for Multi-User Dynamic Spectrum Access
    Gafni, Tomer
    Cohen, Kobi
    2019 57TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2019, : 347 - 351
  • [3] File Dynamic Integrity in a Multi-User Environment
    Xu, Ziqi
    Lin, Yaping
    Liu, Qin
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 193 - 198
  • [4] COMPUTER COLOR CONTROL IN A MULTI-USER ENVIRONMENT
    PARKER, DW
    JOURNAL OF COATINGS TECHNOLOGY, 1979, 51 (652): : 44 - 45
  • [5] Distributed learning algorithm with synchronized epochs for dynamic spectrum access in unknown environment using multi-user restless multi-armed bandit
    Agrawal, Himanshu
    Asawa, Krishna
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 5435 - 5447
  • [6] Hierarchical Role-Based Access Control for Multi-User Collaborative CAD Environment
    Teng C.-C.
    Mensah F.N.
    Ekstrom J.
    Helps R.
    Jensen C.G.
    Teng, Chia-Chi (ccteng@byu.edu), 1600, Bellwether Publishing, Ltd. (13) : 397 - 408
  • [7] A Combined Method of Multi-user Detection in Dynamic Environment
    Wang Baichuan
    Zhao Zhijin
    Yao Yao
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 116 - 119
  • [8] Access control for adaptive reservations on multi-user systems
    Cucinotta, Tommaso
    PROCEEDINGS OF THE 14TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, 2008, : 387 - 396
  • [9] Dynamic Spectrum Access Using Stochastic Multi-User Bandits
    Bande, Meghana
    Magesh, Akshayaa
    Veeravalli, Venugopal V.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (05) : 953 - 956
  • [10] Delay Analysis of Multi-User Dynamic Spectrum Access Networks
    Safavi, Ebrahim
    Subbalakshmi, K. P.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON DYNAMIC SPECTRUM ACCESS NETWORKS (DYSPAN), 2015, : 319 - 325